International Journal of Security and Networks
2014 Vol.9 No.3
Pages | Title and author(s) |
125-132 | A new adaptive intrusion detection system based on the intersection of two different classifiersA. Ahmim; N. Ghoualmi-Zine DOI: 10.1504/IJSN.2014.065710 |
133-143 | Assumptions and conditions for mix networks: analysis, clarification and improvementKun Peng DOI: 10.1504/IJSN.2014.065719 |
144-153 | Spam diffusion in a social network initiated by hacked e-mail accountsGhita Mezzour; Kathleen M. Carley DOI: 10.1504/IJSN.2014.065709 |
154-166 | Network vulnerability analysis of the Player command and control protocolJohn T. Hagen; Barry E. Mullins DOI: 10.1504/IJSN.2014.065708 |
167-176 | Firewalls anomalies severity evaluation and classificationKamel Karoui; Fakher Ben Ftima; Henda Ben Ghezala DOI: 10.1504/IJSN.2014.065712 |
177-184 | Signalling optimisation for VoIP service in All-IP networkJongdeug Kim; Taehyun Jeon DOI: 10.1504/IJSN.2014.065721 |